Windows Vulnerability Discovery and Hardening familiarizes students with common exploitation techniques and the appropriate countermeasures to effectively mitigate an attack. For the first two days, a subject matter expert exposes how attackers:
Identify weaknesses by performing reconnaissance
Exploit vulnerabilities to gain initial access
Evade detection to establish persistent footholds
During the last day, students implement mitigations to harden Windows workstations, servers, and applications against the previously learned techniques. With these skills, you will be able to assess a Windows host for vulnerabilities and deploy solutions to effectively hinder an attacker.
Host Fingerprinting and Service Enumeration
OpenVAS Vulnerability Scanner
Privilege Escalation Techniques
Pillaging and Lateral Movement Tactics
Credential Theft Mitigations
Persistence Mechanism Auditing
AppLocker Application Whitelisting
Attack Surface Reduction
Event Log Management & Analysis
The materials within this course focus on the Knowledge Skills and Abilities (KSAs) identified within the Specialty Areas listed below. Click to view Specialty Area details within the interactive National Cybersecurity Workforce Framework.